IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   Prev IPSJ-SPT Conf / Next IPSJ-SPT Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


Special Interest Group on Security Psychology and Trust (IPSJ-SPT) [schedule] [select]

Technical Committee on Information and Communication System Security (ICSS) [schedule] [select]
Chair Hiroki Takakura (NII)
Vice Chair Katsunari Yoshioka (Yokohama National Univ.), Kazunori Kamiya (NTT)
Secretary Takahiro Kasama (NICT), Akira Yamada (KDDI labs.)
Assistant Keisuke Kito (Mitsubishi Electric), Toshihiro Yamauchi (Okayama Univ.)

Conference Date Mon, Mar 1, 2021 09:10 - 18:00
Tue, Mar 2, 2021 09:10 - 18:05
Topics Security, Trust, etc. 
Conference Place  
Registration Fee This workshop will be held as the IEICE workshop in fully electronic publishing. Registration fee will be necessary except the speakers and participants other than the participants to workshop(s) in non-electronic publishing. See the registration fee page. We request the registration fee or presentation fee to participants who will attend the workshop(s) on ICSS.

Mon, Mar 1  
09:10 - 10:50
(1)
ICSS
09:10-09:35 Developing and Characterizing a New Approach to Extracting Communication Sessions Associated with NIDS Alerts Ryosuke Ishibashi, Hiroki Goto (Kyushu Univ.), Chansu Han, Tao Ban, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.)
(2)
ICSS
09:35-10:00 Detection of Infected Device Using DNS Traffic Soichiro Kogo, Atsushi Kanai (Hosei Univ.)
(3)
ICSS
10:00-10:25 Understanding the Adoption and Operation of DNS Cookie: Current State and Future Prospects Masanori Yajima (Waseda Univ.), Daiki Chiba (NTT), Yoshiro Yoneya (JPRS), Tatsuya Mori (Waseda Univ./NICT)
(4)
ICSS
10:25-10:50 Construction of Vulnerability Evaluation System with Machine Learning Methods Ryu Watanabe, Takashi Matsunaka, Ayumu Kubota (KDDIR), Junpei Urakawa (KDS/KDDIR)
  10:50-11:05 Break ( 15 min. )
Mon, Mar 1  
11:05 - 12:20
(5)
ICSS
11:05-11:30 A proposal of model for scale and frequency of cyber incidents based on organizational attributes Kazuki Ikegami, Hiroaki Kikuchi (Meiji Univ.)
(6)
ICSS
11:30-11:55 Method of Similarity Evaluation among Incidents for Multi-Located Network Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII)
(7)
ICSS
11:55-12:20 Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures Tomohiro Noda, Hirokazu Hasegawa, Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII)
  12:20-13:40 Lunch Break ( 80 min. )
Mon, Mar 1  
13:40 - 14:55
(8) 13:40-14:05  
(9) 14:05-14:30  
(10)
ICSS
14:30-14:55 A path authentication framework based on One-way cross networks Kosuke Ishibashi, Masakazu Soshi (Hiroshima City Univ.)
  14:55-16:00 Break ( 65 min. )
Mon, Mar 1  
16:00 - 18:00
(11) 16:00-18:00  
Mon, Mar 1  
09:10 - 10:50
(12)
ICSS
09:10-09:35 On the Privacy Risk of Exposure Notification Framework: Assessment and Countermeasures Kazuki Nomoto (Waseda Univ.), Mitsuaki Akiyama (NTT), Masashi Eto (NICT), Atsuo Inomata (Osaka Univ.), Tatsuya Mori (Waseda Univ./NICT)
(13)
ICSS
09:35-10:00 A Method for Reconstructing Hidden Background Image in Tele-conference with Virtual Background Satoki Tsuji, Ryusei Ishikawa (Ritsumeikan Univ.), Masashi Eto (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Hiroshima City Univ.)
(14)
ICSS
10:00-10:25 Implementation and Evaluation of a Plagiarism Detection Method for Source Code on Programming Contest Ryusei Ishikawa (Ritsumeikan Univ.), Yuichi Hattori (Secure Cycle), Hiroyuki Inoue (Hiroshima City Univ.), Atsuo Inomata (Osaka Univ.)
(15)
ICSS
10:25-10:50 Design and implementation of a cyber security exercise rewinding mechanism Yuma Kodera, Chinen Kenichi (JAIST)
  10:50-11:05 Break ( 15 min. )
Mon, Mar 1  
11:05 - 12:20
(16) 11:05-11:30  
(17) 11:30-11:55  
(18) 11:55-12:20  
  12:20-13:40 Lunch Break ( 80 min. )
Mon, Mar 1  
13:40 - 15:20
(19)
ICSS
13:40-14:05 An Evaluation of Scalable Clustering in Fast Construction Algorithm of Phylogenetic Tree Tianxiang He (Kyushu Univ.), Chansu Han, Ryoichi Isawa, Takeshi Takahashi (NICT), Shuji Kijima, Jun'ichi Takeuchi (Kyushu Univ.)
(20)
ICSS
14:05-14:30 Improvement of Functional Difference Investigation Method and Analyzing for Clusters of IoT Malware Reo Kawasoe (Kyushu Univ.), Chansu Han, Ryoichi Isawa, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.)
(21)
ICSS
14:30-14:55 Analyzing the Transition of Vulnerabilities Targeted by IoT Malware Kaichi Sameshima, Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU)
(22)
ICSS
14:55-15:20 Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU)
  15:20-16:00 Break ( 40 min. )
Tue, Mar 2  
09:35 - 10:50
(23)
ICSS
09:35-10:00 Proposal for Chameleon Hash with a Revocation Function Koki Matsubara (Osaka Univ.), Atsuko Miyaji (Osaka Univ./ JAIST), Tian Yangguang (Osaka Univ.)
(24)
ICSS
10:00-10:25 Authentication and authorization of IoT devices using blockchain and fog nodes Takahiro Igarashi, Yuichi Futa (TUT)
(25)
ICSS
10:25-10:50 Consideration on the mechanism of identifying and tracking Bitcoin users Toshiaki Saisho (Advanced IT Corp.), Shigeo Tsujii (Chuo Univ.), Kouichi Sakurai (Kyushu Univ./ATR)
  10:50-11:05 Break ( 15 min. )
Tue, Mar 2  
11:05 - 11:55
(26)
ICSS
11:05-11:30 Study on analyzing Memcached DRDoS attacks and their infrastructures Mizuki Kondo, Natsuo Shintani (YNU), Daisuke Makita (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
(27)
ICSS
11:30-11:55 Distributed Slow HTTP DoS Attack Detection by Combining Multiple Schemes Koki Tamura, Yuichi Futa (TUT)
  11:55-13:40 Lunch Break ( 105 min. )
Tue, Mar 2 PM 
13:40 - 15:45
(28)
ICSS
13:40-14:05 Research on the vulnerability of homoglyph attacks to online machine translation system Takeshi Sakamoto, Tatsuya Mori (Waseda Univ)
(29)
ICSS
14:05-14:30 Developing an Interactive Analysis System for Voice Assistant Apps Atsuko Natatsuka (Waseda Univ.), Ryo Iijima (Waseda Univ./NICT), Takuya Watanabe, Mitsuaki Akiyama (NTT), Tetsuya Sakai (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT)
(30)
ICSS
14:30-14:55
(31)
ICSS
14:55-15:20 Security Evaluation of End-to-End Encryption of LINE Version 2 Kotaro Kita, Takanori Isobe (UH)
(32)
ICSS
15:20-15:45 The linear probability of the stream cipher Salsa Junru Li (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST)
  15:45-16:00 Break ( 15 min. )
Tue, Mar 2 PM 
16:00 - 16:50
(33)
ICSS
16:00-16:25 Evaluation of resonance-induced attacks on inertial measurement unit Yuta Minamisawa, Ryo Iijima (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT)
(34)
ICSS
16:25-16:50 Security Evaluation of PUF utilizing Unrolled Architecture Yusuke Nozaki, Kensaku Asahi, Masaya Yoshikawa (Meijo Univ.)
Tue, Mar 2 AM 
09:10 - 10:50
(35)
ICSS
09:10-09:35 A Study on the Adoption of Link Preview by the Phishing Sites Norihito Omori (Waseda Univ.), Satoshi Furutani, Takuya Watanabe, Toshiki Shibahara, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.)
(36)
ICSS
09:35-10:00 An Efficient Discovery of Malicious URL Using VirusTotal and Web Access Log Chika Hiraishi, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
(37)
ICSS
10:00-10:25 Evaluation of Uncertain Reports by Multiple Anti-virus Engines Kazuya Nomura (Waseda Univ.), Mistuaki Akiyama (NTT), Masaki Kamizono (Deloitte Tohmatsu Cyber LLC), Takahiro Kasama (NICT)
(38)
ICSS
10:25-10:50 Proof of concept of sandbox evasion attack using email address stored in target machine Yuta Inoue, Rui Tanabe (YNU), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
  10:50-11:05 Break ( 15 min. )
Tue, Mar 2 AM 
11:05 - 11:55
(39)
ICSS
11:05-11:30 Accuracy evaluation of CNNs and random forests with Malware API call sequences Shugo Asai, Futa Yuichi (TUT)
(40)
ICSS
11:30-11:55 Detecting unknown malware families by anomaly detection using deep learning Ren Takeuchi, Shintaro Mizuno, Vo Ngoc Khoi Nguyen, Jun Tsuchiya, Masakatsu Nishigaki, Tetsushi Ohki (Shizuoka Univ.)
  11:55-13:40 Lunch Break ( 105 min. )
Tue, Mar 2 PM 
13:40 - 15:45
(41) 13:40-14:05  
(42) 14:05-14:30  
(43) 14:30-14:55  
(44) 14:55-15:20  
(45) 15:20-15:45  
  15:45-16:00 Break ( 15 min. )
Tue, Mar 2 PM 
16:00 - 18:05
(46) 16:00-16:25  
(47) 16:25-16:50  
(48) 16:50-17:15  
(49) 17:15-17:40  
(50) 17:40-18:05  

Announcement for Speakers
General TalkEach speech will have 18 minutes for presentation and 7 minutes for discussion.

Contact Address and Latest Schedule Information
IPSJ-SPT Special Interest Group on Security Psychology and Trust (IPSJ-SPT)   [Latest Schedule]
Contact Address  
ICSS Technical Committee on Information and Communication System Security (ICSS)   [Latest Schedule]
Contact Address Hiroki Takakura(National Institute of Informatics)
E--mail: is-adm-q 
Announcement Latest information will be presented on the homepage:
https://www.ieice.org/iss/icss/index-en.html


Last modified: 2021-02-28 09:50:45


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ICSS Schedule Page]   /   [Return to IPSJ-SPT Schedule Page]   /  
 
 Go Top  Go Back   Prev IPSJ-SPT Conf / Next IPSJ-SPT Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan